Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 16:28

General

  • Target

    b471d83544480a8ce96646e0f4bc4d4ad483ccf2eb2b93e7f16eca4906c28139.exe

  • Size

    3.1MB

  • MD5

    54c9ea8ac7622aff4d850cf022a22a1d

  • SHA1

    1de3718ae7e13ea6ecacb896fddb243fd231d26a

  • SHA256

    b471d83544480a8ce96646e0f4bc4d4ad483ccf2eb2b93e7f16eca4906c28139

  • SHA512

    bf776b2f8bd8e5551d65d95277fb5d1316b39ed7b7feb345de1966716cfb4194261900d7adb02b2958539164469ac6eb19f10d61bd8c0a7af3da2eb7127caf01

  • SSDEEP

    49152:WCT6txMtB7zQj79mS2wU2xRClLzoWbNsLVJAY:WC2t0sj79mS2wUuRCpI5+

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Panda Stealer payload 2 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Pandastealer family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b471d83544480a8ce96646e0f4bc4d4ad483ccf2eb2b93e7f16eca4906c28139.exe
    "C:\Users\Admin\AppData\Local\Temp\b471d83544480a8ce96646e0f4bc4d4ad483ccf2eb2b93e7f16eca4906c28139.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Users\Admin\AppData\Local\Temp\1006906001\installer.exe
        "C:\Users\Admin\AppData\Local\Temp\1006906001\installer.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:4464
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p265129275187715104258201156 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4560
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1848
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1536
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1528
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4016
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1820
            • C:\Windows\system32\attrib.exe
              attrib +H "windows_updater.exe"
              5⤵
              • Views/modifies file attributes
              PID:536
            • C:\Users\Admin\AppData\Local\Temp\main\windows_updater.exe
              "windows_updater.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:5104
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                6⤵
                  PID:6040
          • C:\Users\Admin\AppData\Local\Temp\1006931001\99c1fd9e27.exe
            "C:\Users\Admin\AppData\Local\Temp\1006931001\99c1fd9e27.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1680
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
              4⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:1632
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8fd54cc40,0x7ff8fd54cc4c,0x7ff8fd54cc58
                5⤵
                  PID:5664
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2260,i,7724889085654828338,15851410646677886737,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:2
                  5⤵
                    PID:4504
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,7724889085654828338,15851410646677886737,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:3
                    5⤵
                      PID:5952
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1992,i,7724889085654828338,15851410646677886737,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:8
                      5⤵
                        PID:6092
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,7724889085654828338,15851410646677886737,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:4604
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,7724889085654828338,15851410646677886737,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:728
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,7724889085654828338,15851410646677886737,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:6132
                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                      "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:5972
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:3740
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 1288
                      4⤵
                      • Program crash
                      PID:5244
                  • C:\Users\Admin\AppData\Local\Temp\1006936001\fcb360baf6.exe
                    "C:\Users\Admin\AppData\Local\Temp\1006936001\fcb360baf6.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3976
                  • C:\Users\Admin\AppData\Local\Temp\1006937001\b1f59fdaf5.exe
                    "C:\Users\Admin\AppData\Local\Temp\1006937001\b1f59fdaf5.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4900
                  • C:\Users\Admin\AppData\Local\Temp\1006938001\da6d5d60b5.exe
                    "C:\Users\Admin\AppData\Local\Temp\1006938001\da6d5d60b5.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:3716
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM firefox.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3852
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM chrome.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5096
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM msedge.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3568
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM opera.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3520
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM brave.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3104
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:884
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        5⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:4116
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {68993a72-eb52-4c8f-8425-938208dbf891} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" gpu
                          6⤵
                            PID:2404
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5173fc62-169e-4fa6-96d4-2dbf0ab76faa} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" socket
                            6⤵
                              PID:4620
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1504 -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 3188 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1324 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7cb87e32-84a5-4ead-9928-745bd2db4672} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab
                              6⤵
                                PID:4128
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3524 -childID 2 -isForBrowser -prefsHandle 3728 -prefMapHandle 2748 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1324 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {396fb36e-e3eb-4448-b869-09e4bfa80288} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab
                                6⤵
                                  PID:312
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4368 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1280 -prefMapHandle 3672 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18389233-1a58-4524-8525-cb30767e56cc} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" utility
                                  6⤵
                                  • Checks processor information in registry
                                  PID:5560
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5536 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1324 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c15cea8e-ca9b-4044-873a-c292ccd08086} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab
                                  6⤵
                                    PID:1956
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 4 -isForBrowser -prefsHandle 5520 -prefMapHandle 5516 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1324 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0282920b-5a98-4b9c-841c-5c0097d07564} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab
                                    6⤵
                                      PID:5124
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5864 -childID 5 -isForBrowser -prefsHandle 5940 -prefMapHandle 5936 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1324 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c8b496d-f157-4c03-951b-1ad26971d8c1} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" tab
                                      6⤵
                                        PID:5480
                                • C:\Users\Admin\AppData\Local\Temp\1006939001\c3ca0d6652.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1006939001\c3ca0d6652.exe"
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Windows security modification
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1112
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4868
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5296
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:5164
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 1680
                                1⤵
                                  PID:5824
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5596
                                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                  C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:1344

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                                  Filesize

                                  19KB

                                  MD5

                                  8cc139503f13f3397a1d9aaed802dd9a

                                  SHA1

                                  a31c063b8a442d8f94f7b976b8fa49d1b8219229

                                  SHA256

                                  f6b83ef4a7a55727ed799de7b3488566e526c4b81c01d67257461b4e9a942e75

                                  SHA512

                                  3a13d02a19772fd209408b9d7c3f1d19cc3dbccc580546ae87c57c0ac9ec97426da830cd3fe925f21c7e48b7c0076478a86ff4a12eb90d0574d8e9fa111095de

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                  Filesize

                                  13KB

                                  MD5

                                  59b7b7ec368e184ce2fd723a5f8a2304

                                  SHA1

                                  95679e2676c97dc1fad896a1d47a6696d096ccc9

                                  SHA256

                                  434b1545ea3d65fe1754e01e7c286c702c3fa13f67e3bd1adc7cd3f952956f95

                                  SHA512

                                  9b29cfa136a4308502c9f6ea1a4ae3f7d74566d4e420f7601b19db7d22f0386e0c7c88dd82c351ffab1137866bc05ae0c3e77e2619f0d5733c70b212e6ad7464

                                • C:\Users\Admin\AppData\Local\Temp\1006906001\installer.exe

                                  Filesize

                                  3.4MB

                                  MD5

                                  ea92841008ce88c44523bc57ff3b9264

                                  SHA1

                                  a00d6774503a8831aab032512503d1c2a50e080e

                                  SHA256

                                  8ab47b2cc9ad9a729da5700643f8bd7309e2f2fc1cca5b8eed194c0d004759e0

                                  SHA512

                                  e2ec52354758053bdb69be7b281701fe61d6f991e23a2171b5e9511f8caa6e148ae73fe8cfc7b23215ea3887d3fbf8f5be4d2c2c3f8fe20cdeea67401f68d459

                                • C:\Users\Admin\AppData\Local\Temp\1006931001\99c1fd9e27.exe

                                  Filesize

                                  4.2MB

                                  MD5

                                  f1aefbe49a406f12313f1c56deb2e3cd

                                  SHA1

                                  182c4978fd940c4d7f504fe985477fe0512cf1f9

                                  SHA256

                                  5e8e38f8b153083db2940a4a7e169f3118880ae012c12e87a7a976060d0b1b52

                                  SHA512

                                  69e0f083e93b3c0a5ee153e4c6b89cb50bc5bbc4fc9c589606856de518e5705d54219f5e0fda01a6b9d53e03ab76836d335bc3d4a47047590438abd51c36ef78

                                • C:\Users\Admin\AppData\Local\Temp\1006936001\fcb360baf6.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  a58c2381b3a09794c5f79c1bc6358fd9

                                  SHA1

                                  70db592fd9154a831da656438c3f558c376b1053

                                  SHA256

                                  fef10d7378cf8912453034be5c0b36bab453d66962290a1a0b64222fb30f4e56

                                  SHA512

                                  4c5674acf0a738b09c6189ef04cccf33f33fdadace1e70bec3d163c934fd9343b4904bf952597647b6e0605b011898ff654e7b7dd2672dc3aa8cf5ebd8f41c40

                                • C:\Users\Admin\AppData\Local\Temp\1006937001\b1f59fdaf5.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  fb7f52e927eb080353dad4ee04ed6928

                                  SHA1

                                  671c3191dbe04a2837d626ef461d2040367a0787

                                  SHA256

                                  781d3d06701d435632f81208b7b250177dc7225c99fa9858e278044d8bb0291a

                                  SHA512

                                  e148446d01347d4fe7dd661255e6b61e8bdf8b0659d3290b656f1aabd1b0fd2875bcd0ce0719479669329fbd899781ebba73f9ebe7ff61625f227620c5af9607

                                • C:\Users\Admin\AppData\Local\Temp\1006938001\da6d5d60b5.exe

                                  Filesize

                                  900KB

                                  MD5

                                  3a44f05bfffa293a0ad7976734601a43

                                  SHA1

                                  5129c6bc84175dd6055ec97c602e0d964e6ded72

                                  SHA256

                                  6fb80943f7ea97db7beff9ae2af80c569ccef979fce5d87b9507e848064033c2

                                  SHA512

                                  da7460bdaaeecf8c230dce20567e253508af9af40551b952887667f37366046f4dc263f8371bc6227a86f33b724650e7b242eb0508cea4c4833dc801003c385f

                                • C:\Users\Admin\AppData\Local\Temp\1006939001\c3ca0d6652.exe

                                  Filesize

                                  2.6MB

                                  MD5

                                  8ae048be65ef4f7e0bb62f4376624250

                                  SHA1

                                  0be9d4a59a9948d88093aea6cf21573e7483c701

                                  SHA256

                                  edcd24c6c8cb8561fea63e3f7be938f96b55408e284caaac9c00da0deeb63417

                                  SHA512

                                  07488987b1ea8128621cb75f8b923581a12e697569edf5b50e84b7d06b3459f2399f29f5a769dc05a300868b2a920c9ebd45435d04c22616fad20c3c7093b379

                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                  Filesize

                                  3.1MB

                                  MD5

                                  54c9ea8ac7622aff4d850cf022a22a1d

                                  SHA1

                                  1de3718ae7e13ea6ecacb896fddb243fd231d26a

                                  SHA256

                                  b471d83544480a8ce96646e0f4bc4d4ad483ccf2eb2b93e7f16eca4906c28139

                                  SHA512

                                  bf776b2f8bd8e5551d65d95277fb5d1316b39ed7b7feb345de1966716cfb4194261900d7adb02b2958539164469ac6eb19f10d61bd8c0a7af3da2eb7127caf01

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                  Filesize

                                  1.6MB

                                  MD5

                                  72491c7b87a7c2dd350b727444f13bb4

                                  SHA1

                                  1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                  SHA256

                                  34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                  SHA512

                                  583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                  Filesize

                                  458KB

                                  MD5

                                  619f7135621b50fd1900ff24aade1524

                                  SHA1

                                  6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                  SHA256

                                  344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                  SHA512

                                  2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                  Filesize

                                  2.2MB

                                  MD5

                                  49bece84546c14bf9852f4982355a029

                                  SHA1

                                  71832a1cc47bdb088d0640e75f68b172949a52ff

                                  SHA256

                                  94ed3446aff856cf13db67e66523bf5c27498a5e973a1872f0b01d5561fd84e6

                                  SHA512

                                  ab376332432f256033edf24895a25334bb6fc5466ec27e4ff1fc97124b3fa3dfb831f957b047540e24501e57f32c782afb293982dce65baed9951576891d5613

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                  Filesize

                                  935KB

                                  MD5

                                  1c37a797095b86fcf6056c8c61b93530

                                  SHA1

                                  d936c4b7f4d010700c5ed79eb2c492eb3ef8e0ab

                                  SHA256

                                  44963e0061eea636f9fc04f432def875511f2ef44e3e1bbbe27e8c9f7665b3be

                                  SHA512

                                  bf4e400d62df64affa685925507b3ad654b1441ba86d257b6ed5d500d401d2bd2a395ec326981a55cb10444e1cd34c46b3a89e4f7e9a58362ae86cd3b1d288e0

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                  Filesize

                                  936KB

                                  MD5

                                  0316b6e00496d2a010be085a35c96254

                                  SHA1

                                  c32899260e761263c97cace3b88f6d8185c02aa3

                                  SHA256

                                  e0028bcb87b403418f3df174d26d2dae1282b8f2c24ced445a66153131f84d24

                                  SHA512

                                  e963ada17ff31db3329d92b43bb43bf06027814692d0bc020c4998cbc82e38246fd83e10f57496c0cd9aefa882faec126156d69388835e77e43aa75d2bc78ffc

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                  Filesize

                                  936KB

                                  MD5

                                  533842397e87a053ddcc53be440b4de0

                                  SHA1

                                  d633b1ad6b8c10eba2c2df61336147707cfc0953

                                  SHA256

                                  4be46d0d712f765aec42b93f4219ed2738835be2ed863f0901aee26ff9511fb1

                                  SHA512

                                  fb1dc065e4e995a010c324cbd7c681e352229c8cbdeb11903bbc769f56d6b590c792ffdd01cf8a5c150f9040bc4c8f66da91c24c195f6e1d7db3c42ede5c1252

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                  Filesize

                                  936KB

                                  MD5

                                  7bd2be2fe2ae9c0efd7bf6c1e4e94035

                                  SHA1

                                  4e7cfdfdf1e853c2e5ce17b4d4a961745b5e5abf

                                  SHA256

                                  511ea1e527cfbeb81a4e94216461fe386800d6a76339fdfd43bb7f037193cb6b

                                  SHA512

                                  ba9879e208b6452c1f526b55a84ebe937966333740682d453d75993b1bbd2ba164f233bc79618a1c94cddf094ca3f41a83870bfd53a341e72ccd0e7cf3e7a0cc

                                • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                  Filesize

                                  2.5MB

                                  MD5

                                  57961d924cd1c4d4a697c76965549e01

                                  SHA1

                                  4661f3858cf24f054bdbbdf1208532e0b951e6b6

                                  SHA256

                                  d662a031876e3ece878193fab26b34a44983545107945223173a3422e7e48301

                                  SHA512

                                  32af6a9afc35b6e333be21c8ed46da12b39f8c49fe4528520756ae128199fe6b68b856d03ea69cd922924dd8b2fbb02bb9c7b7e31677c727855c6d6d09f61524

                                • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                  Filesize

                                  2.5MB

                                  MD5

                                  39c5608dbca0eb60734913279eb28d08

                                  SHA1

                                  9f1ae44ea0ad16e7d5f87620c8d972870a401554

                                  SHA256

                                  9d1ee13c76954e17c276e49f49777e677728dd486633848d17d05fe7750a538c

                                  SHA512

                                  0d013cb0a528bffcfed35ac8433fa0a00dde0340f4059a0822ca6bf4499afbc59c693c3301560d997d9cfd6ee00128e73899f210f573a574c36561ad8d4eb7dd

                                • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                  Filesize

                                  503B

                                  MD5

                                  d7e0823fbf0608294117e8587febce91

                                  SHA1

                                  e39d6cc2c88acb1d5db2c7bbc2da11e4bb889717

                                  SHA256

                                  f0e8e915de6318aaaf1de16b9c9314893cb5913cb34ec3d6c2222d6c7aaa0954

                                  SHA512

                                  521cea12c437547796ef794f2a8b0534f2b39aa476d96a6783c3ee0a63bbf397623fcb0585e1bbd55b45e7807e5471f2d089725d2154f0059d48352092d80c4f

                                • C:\Users\Admin\AppData\Local\Temp\main\windows_updater.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  07a6fec3ef9c7b81afe5c3fc0ac2e853

                                  SHA1

                                  df97e5022e854b2a1c601bff94fabc8328d29c4f

                                  SHA256

                                  fd176f18ce42b5ca62fb627cb6ab420c72b10a6c2f6d414c7c06a0ccf9dfdab8

                                  SHA512

                                  99e5f667aaac4be997db920393693323495431a19c2279074eb4713e69198fc8775747d78cd8511ab4c681f2c5dd7b729e02dc8ba35ce98e5812d753c8a214f1

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                  Filesize

                                  479KB

                                  MD5

                                  09372174e83dbbf696ee732fd2e875bb

                                  SHA1

                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                  SHA256

                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                  SHA512

                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                  Filesize

                                  13.8MB

                                  MD5

                                  0a8747a2ac9ac08ae9508f36c6d75692

                                  SHA1

                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                  SHA256

                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                  SHA512

                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                  Filesize

                                  6KB

                                  MD5

                                  2cc0e8c6e3e0d34b07eeaea61a85ff3c

                                  SHA1

                                  87f86432a3d62451fa2b48182505a75cee99d9af

                                  SHA256

                                  9a6c47b1fe0362147df93836a49a65098ab227c00d9d27c8c2df277673ef3660

                                  SHA512

                                  0da32d94ca1e3ecea0d9dc6dbcbe2d84d6162dd6c80b6e0ec45c0831b2ceb7b9b53bdddadd9e0c7227a5cb221bfd9bbc4a91582b0c7a943a1c36b4d2d6242881

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                  Filesize

                                  7KB

                                  MD5

                                  0c6bd88bfbaaec756a11c30c480d15b2

                                  SHA1

                                  c33ff13c6e581726775e126c5ce3ad115fcefb17

                                  SHA256

                                  c53c255cf6546a2d2a6c14297cb4dd61dbfaaf2c7041c5b725061b44dc02ae6d

                                  SHA512

                                  d006e661ec20217fa78a0baadc5648c406babe4ca1e3272bdb4ad66c2f05e02eb2adc6064e410df0b45f8d634837184002ce4ef7776866d39945976cb4e8679d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                  Filesize

                                  13KB

                                  MD5

                                  c4ab350ba529e2c70c2e4beaea3f5183

                                  SHA1

                                  aab5b5ee1004795d38d275e25c1490aac0afd313

                                  SHA256

                                  024fe4ef9d31997de4250d7bc51c4e28a7734b17d7987642f7fd04994a9ab456

                                  SHA512

                                  eea2c61dda1724cd10abe9f2e4251a13ef372d712e43ade0711c18bcc63eba3b26f7109b7a22a5d4c1d745d8f7f8e76285567a32fcd31522ad98f5bd62a78391

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  15KB

                                  MD5

                                  fa4a54482652eb35fe4b10e4094c8617

                                  SHA1

                                  e1ccf3c48f30ec0d91c4a4f477cb9c8a8319da98

                                  SHA256

                                  e32b6d385e4be44578a6b0221b78578cbb78d8fa97faee118b4be8bc72eee84d

                                  SHA512

                                  b3dfdeae8f06a9dad111f546f23ba14ba1b09786ec2861cf3cea982ed250e2f12cc2c5c9d01eb396db9caabf03044c89df85a9536841da69f8d0b61f0fa937ce

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  5KB

                                  MD5

                                  5da2887f20f58bd0ac80142bf86cd25f

                                  SHA1

                                  342885f1084322a0ceff9310f8abf8972b165e71

                                  SHA256

                                  a45768c9d15342ba98c58284029115120161c88c11bd0cf813302f0059bea90d

                                  SHA512

                                  ca1da1238d4a7a5fb21abdda1de05accab6f343e86cf6ddae024b60eeb54deb52b2ca7bee964218ff54f28a6fb34bd32f350dcacbca6931595c13a3cc2b70841

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  6KB

                                  MD5

                                  f9d6392bf3d6d634af4b6b3522c6a05a

                                  SHA1

                                  bf1fb0ff8276b8ed99cb7cec77ca7fdcc03b8de9

                                  SHA256

                                  bda753409b0cbd51b8680597d2f743080a77d95bf430ffec2f013f356e94a5c8

                                  SHA512

                                  6fd508cf47e83d47ae7cdd971ab4deed6f90c99315c4524f3c61d07e7a05a18838bef200b4fb3877f4a15d269ebd417aaefb4e49399545481afafea3a62903a7

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  15KB

                                  MD5

                                  951cea81e8f9918f4fa0a5d09e23e13a

                                  SHA1

                                  3f0ec5e58c2974533fe78f27bd404fdbc32d58de

                                  SHA256

                                  241bbef2a069967236e1dc177fa8fc7304c396c298e966d18eebf732914c2dbc

                                  SHA512

                                  65539454574311a7a942ce6ddc0de635b2e91b2dee090f0e9948efaab9128945fab3292d6551bcf327813085e7981fdaebe708a5e18f639d47512b50bdd66eda

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\35876d9d-b670-4597-a3a8-ba5a632ab354

                                  Filesize

                                  671B

                                  MD5

                                  edf42ee133ff69665678d33c812e0830

                                  SHA1

                                  12275a829dfe58927c9f27ec0df7b4f4eee892a7

                                  SHA256

                                  5afbfe3b13e8f2a7815c5baeede722086df4dc7aa32ea2adf4ad1047ceec4b44

                                  SHA512

                                  3c690e342da7c4ff3e8938e10a1189916c603d8bd9cc18d6cf6493a8ef903fd3f495f19cd81e029d96088d16a481841d6e2b23cdfc228681fa93dd260d2c74f5

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\419e784e-4260-43eb-89a0-2f5e4506bf58

                                  Filesize

                                  25KB

                                  MD5

                                  56ef56c26ff4cca66d2045b94c46ec79

                                  SHA1

                                  76accb182478eb9a9c866ca94f156cd7f22ca09d

                                  SHA256

                                  bba0797a6ed3f4e20d74285e354f9534a24bfe6fffe58ac0c9c4a83351f77e4d

                                  SHA512

                                  af596d584c50a7c1ed5176967c52efae8d315e2d3b0071b46ddb8ccf328c23aeaa298e55c572c5b25a14918b7a26a55293d0423ecb435a0cddcf2b7b1f2438b1

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\7e1708c3-ddaa-4ead-bce1-008df7b9abb2

                                  Filesize

                                  982B

                                  MD5

                                  e594274e5d5857b0f75b60db0d3352be

                                  SHA1

                                  9d50c34c3332cf82dbbaa639cfee94e270e7d6eb

                                  SHA256

                                  6896886467a8b8a18be766caa69057b4219f1ba25bd7da79fc25ddd7f11f0b90

                                  SHA512

                                  af2fe7b4b2ca2a530b1ecb208efc62ec3aa0b4bcb3b75b48384b4ede4cad1c8c0fa08f6c72ae08b7d914e0aedace9d91428aeca1c064e5bb2711a9c34170d874

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  842039753bf41fa5e11b3a1383061a87

                                  SHA1

                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                  SHA256

                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                  SHA512

                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                  Filesize

                                  116B

                                  MD5

                                  2a461e9eb87fd1955cea740a3444ee7a

                                  SHA1

                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                  SHA256

                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                  SHA512

                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                  Filesize

                                  372B

                                  MD5

                                  bf957ad58b55f64219ab3f793e374316

                                  SHA1

                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                  SHA256

                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                  SHA512

                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                  Filesize

                                  17.8MB

                                  MD5

                                  daf7ef3acccab478aaa7d6dc1c60f865

                                  SHA1

                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                  SHA256

                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                  SHA512

                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                  Filesize

                                  16KB

                                  MD5

                                  30fcadd58ff0ea8136f745663dec4273

                                  SHA1

                                  4cd6ac31104185dac1c9cc744eba44f9cafb3874

                                  SHA256

                                  49ba0022da4d7c6720c45f14a62cd30ea4fef660b1772dfa6b64fac721e10b42

                                  SHA512

                                  8864c75b577218a3821bd774ab06b3455ac67ac51e737fd2eb783b41abb9ee1c85cc1597a32c4805d63cfe320d209e4dd33a9c7b52b70c0ba3926e73f7f28b27

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                  Filesize

                                  10KB

                                  MD5

                                  be8182e88e27aaa0a72af10cccf5e414

                                  SHA1

                                  db07cc16c23d8650f7642e41958a07600dd9e525

                                  SHA256

                                  0ac500c5b2d9e5b38d2e4c49ddabad909e4c090980e4e4b4358f01243b8b8b36

                                  SHA512

                                  e21f03ab4df758cb5be07a71c9657ea8aefadb323a14dff0d15e70422307968e35a4d19106c9935ab0fd2a9f42e9f51b5137da8b9b7219022d4bafae6eb72cad

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                  Filesize

                                  11KB

                                  MD5

                                  b79ad25232c5f2c6fc0ce7c15eaacd80

                                  SHA1

                                  48f08b3666cbcdbf5d30e525c27bc724508c02ee

                                  SHA256

                                  8fb596636f7f7557f7e8d508905ab69e4a4cc7600329aaf07a82d342e538d8c7

                                  SHA512

                                  64c4d6279384b2a16a0fda465096fdd087b49b11dcc97d01354287cdb16deddd36f77530105c6a0b96f3e1e64e3eb764cfc600e8daaedb43536d992d5da8b9a9

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                  Filesize

                                  11KB

                                  MD5

                                  a2f06b3ee57ad4aaebc8804be2f58c2c

                                  SHA1

                                  83f779ec287f84105303bdfb2817e05c1be5f424

                                  SHA256

                                  c19470e984feb08038e4e5ff724a8a65581a2f488590e80e1d183ba65a3ec5cc

                                  SHA512

                                  2af73239d70f9ffeef736fc089f82a2c322433140f7c6f0f48ab12462c9797e27da1f8ade5fab6d8d5d2139237b003a11a56bee00f68d4ca7c552dd5de5ebe20

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                  Filesize

                                  9.6MB

                                  MD5

                                  451b72883fd1c5b3801709dfca0c8240

                                  SHA1

                                  23a5bc2867105606acf4d27cdce70d3b71431bc6

                                  SHA256

                                  00ff72158cde8a236c61ce06f9f9c7d2b71c2431d80fc3ac2bfe386c66a2f968

                                  SHA512

                                  92f8fb7f1e928f1d678ba4e5d35998b4433f20827d5328deddc344a9e762e8cbd1824a225235546673ce4699960795cb37d6e649246ad720b7c9d39691278f55

                                • \??\pipe\crashpad_1632_ZDSYWXEYGEQAMCPR

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/1112-563-0x0000000000C80000-0x0000000000F20000-memory.dmp

                                  Filesize

                                  2.6MB

                                • memory/1112-564-0x0000000000C80000-0x0000000000F20000-memory.dmp

                                  Filesize

                                  2.6MB

                                • memory/1112-522-0x0000000000C80000-0x0000000000F20000-memory.dmp

                                  Filesize

                                  2.6MB

                                • memory/1112-586-0x0000000000C80000-0x0000000000F20000-memory.dmp

                                  Filesize

                                  2.6MB

                                • memory/1112-598-0x0000000000C80000-0x0000000000F20000-memory.dmp

                                  Filesize

                                  2.6MB

                                • memory/1344-3223-0x00000000004A0000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1680-141-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-140-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-182-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-2897-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-2536-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-2214-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-1593-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-577-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-920-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-890-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                  Filesize

                                  10.4MB

                                • memory/1680-122-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/1680-599-0x0000000000B80000-0x000000000170C000-memory.dmp

                                  Filesize

                                  11.5MB

                                • memory/3628-23-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-2586-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-28-0x0000000000B81000-0x0000000000BE9000-memory.dmp

                                  Filesize

                                  416KB

                                • memory/3628-578-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-20-0x0000000000B81000-0x0000000000BE9000-memory.dmp

                                  Filesize

                                  416KB

                                • memory/3628-2906-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-150-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-3211-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-3216-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-1592-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-22-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-25-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-604-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-123-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-53-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-27-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-181-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-919-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-2213-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-19-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-26-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-21-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3628-24-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3976-595-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-718-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-2018-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-161-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-160-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-2389-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-2501-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-1250-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-139-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/3976-565-0x00000000008D0000-0x0000000000D65000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/4168-2-0x00000000005D1000-0x0000000000639000-memory.dmp

                                  Filesize

                                  416KB

                                • memory/4168-18-0x00000000005D1000-0x0000000000639000-memory.dmp

                                  Filesize

                                  416KB

                                • memory/4168-1-0x00000000774E4000-0x00000000774E6000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4168-3-0x00000000005D0000-0x00000000008E8000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4168-4-0x00000000005D0000-0x00000000008E8000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4168-17-0x00000000005D0000-0x00000000008E8000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4168-0-0x00000000005D0000-0x00000000008E8000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4868-104-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4868-106-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4900-159-0x0000000000FD0000-0x000000000166E000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/4900-158-0x0000000000FD0000-0x000000000166E000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/5296-1251-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5296-1280-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5596-3218-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5596-3220-0x0000000000B80000-0x0000000000E98000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5972-3210-0x0000000073270000-0x00000000733A4000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/5972-3209-0x00000000004A0000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/6040-594-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/6040-589-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB